Você está na página 1de 29

|  

BCA20
Chapter 1
! 
 



!   | 
 !  
 ! permarket ± inventory & checko t
 Credit card ± p rchases & cash advance
 A tomated teller machines ± deposits,
withdrawals & balance inq iry
 Travel agent ± booking, reservation &
ticketing
 Library ± catalog, loans & ret rns
 Ins rance ± c stomer information
 University ± st dent information
G
 
| 
 
!  

 An à à  
 is a system that
collects and stores data. (

à)







| 

 G
 



 aatabase is a shared collection of logically related data,
and a description of this data, designed to meet the
information needs of an organization.

 2
 

 !   

 aata are raw facts  
 Fact abo t something,
someone, entity, event or other  
similar things  



  


 
± the ³data abo t data´.
 
Table 1.1 Example of a aay !ales of Contain !hoe !izes.







| 

 | 

 Are data that has been analyzed and synthesized
 Information is data that has been processed and organized
into a significant form to facilitate decision making.
  





á
    



Fig re 1.1 Example of !hoe !ales Based On !hoe !izes Within 6 Months


 


aata
 ||
Operation

Processed facts, with


shapes and patterns

Fig re 1.2 Transforming aata into Information


!  |      


| 
 !

"  #
 ||

$%|!|| |!|2%|

!&' '|')(

|"%(|
 


 

 !  
 Works well while the n mber of items to be stored is
small.
 It even works q ite adeq ately when there are large
n mbers of items and we have only to store and retrieve
them.
 Man al filing breaks down when we have to cross-
reference or process the information in the files.

Fig re 1.3 Man al Filing !ystem


 


  2
!  
 Is an early attempt to comp terized the man al
filing system in response to the needs for more
efficient data access.
 It is a collection of application programs that
perform services to the end- sers s ch as the
prod ction of reports.
 Each program defines and manages its own data
 aecentralized approach on filing data.
 2
!  

  *+,        


" )
  
(
   

!  

 ! 

 
| 
 


 All programs maintain metadata for each file they se


 The application developer m st synchronize the
processing of two files to ens re the correct data is
extracted.
 
 


 aifferent systems/programs have separate copies of


the same data.
 a plication costs time, money and additional storage
space to enter the data more than once.
 Can lead to loss of data integrity (the data is no longer
consistent).
(
   

!  

a 
a

  *+-        


" )
   !   
 


(
   

!  



     Applications ins lated from
how data is str ct red and stored.
 àà 



m Protection from changes in
àstr ct re of data.
  àà 



m Protection from changes in
àstr ct re of data.
 | 
   

 Programmers m st design their own separate file
formats
 Non-standard file formats
(
   

!  

 . $  " 
 
 
" 

 File-based systems are very dependent to application
developer/programmer who will be the one to write the
req ired q eries or reports.
 As a res lt, the type of q ery or report that co ld be
prod ced is fixed.
 In other organization, proliferation of files and
application programs reached a point where the aata
Processing aepartment, with its c rrent reso rces,
co ld not handle all the work.
 Excessive programming maintenance.
 80% of information systems b dget
! /








 Is a shared collection of logically related data, and a
description of this data, designed to meet the information
needs of an organization.
 No longer owned by one department b t is a shared
corporate reso rce.
 Instead of disconnected files with red ndant data, all data
items are integrated with a minim m amo nt of d plication.
 Is also called a 

à à à 



beca se database not only holds the organization¶s
operational data b t also the description of these data.
 aata is managed by a controlling agent
 !tored in a standardized, convenient form







 

 aatabase approach separates the str ct re of the
data from the application program and stores it in
a database. If new data str ct res are added or
existing str ct res are modified (e.g. new fields to
a record, create new files) then the application
programs are naffected, provided they do not
directly depend pon what has been modified.





 '    
 
 
 An u  is a distinct object (e.g., person, place, thing,
concept, or event) in the organization that is to be
represented in the database.
 An u is a property that describes some aspect of
the object that we wish to record.
 A u
 is an association between entities.






 Is simply a program that interacts with the database at
some point in its exec tion



!  
 Incl des a collection of application programs that interact
with the database.





 !  
! 2!#





 !  ! 2!#
 aBM! is a software system that enables sers to define,
maintain, and control access to the database.
 It provides controlled access to the database s ch asm
 A sec rity system, which prevents na thorized sers
accessing the database;
 An integrity system, which maintains the consistency of
stored data;
 A conc rrent control system, which restores the database
to a previo s consistent state following a hardware or
software fail re;
 A ser- accessing catalog, which contains descriptions of
the data in the database.





 !  
! 2!#








2!



User

Fig re 1.6 A aatabase !ystem







 !  
! 2!#


   (

! (# allows sers to
specify the data type and str ct res and the
constrains on the data to be stored in the database.




 (

! (# allows ses to
insert, pdate, delete, and retrieve data from the
database.
 $  (

is the general inq iry facility
provided by aML.
 ! $  (

!!$(# is the most common
q ery lang age.
 )  
  allows each ser to have his/her
own view of the database red cing complexity by
letting sers see the data in the way they want to
see it.
    2!
'   

 0


 Can range from a PC to a network of
comp ters.
 !

 aBM!, operating system, network software (if
necessary) and also the application programs.
    2!
'   



 Used by the organization and a description


of this data called the schema.
 " 
 Instr ctions and r les that sho ld be applied
to the design and se of the database and
aBM!.
 " 
   



'   
 a    £a



  
! 2#



   !( 


" 
#
 
 " 
 
 ' %  !
 
   
 #
G
 



  

Ú The aBM! software together with the


data itself.
Ú !ometimes, the applications are also
incl ded.
0  


!  
   
 
 0 
 

 1

 !   

  



   

 '.   


  2   



 2!
  .
 req ires a thoro gh nderstanding of the system
to avoid fail re
 !3
 occ pying many megabytes of disk space and
req iring s bstantial amo nt of memory to r n
efficiently
   2!
 ± acq isition and maintenance of new hardware
and software



 2!
 


  
 ± necessary to achieve req ired performance
     

    
3    
 ± req ires hiring of new specialist staffs which
req ires training that event ally req ires cost
 0 



 since reso rces are centralized, fail re of any
component can bring the fail re of all


 2!
  

  
 +


   
   
  
 
 

+
 !
 

+
 aifferent sers get different views of the data
 | 

   +
 Constraints, data validation r les
 |   +
 aisaster recovery is easier
 '    

 +
 All data access is done in the same way
 '   
 +


 2!
 2

    4  
 | 


   

  
 | 

 | 
 
   


    
 | 
  
 | 
1
    

Você também pode gostar